A tcpdump Tutorial with Examples
tcpdump
is the world’s premier network analysis tool—combining both power and simplicity into a single command-line interface. This guide will show you how to use it.
tcpdump is a powerful command-line packet analyzer. It allows you to capture and inspect network traffic in real-time. This tool is invaluable for network administrators, security professionals, and anyone who needs to understand network behavior.
In this tutorial, we’ll explore 50 practical examples of using tcpdump
. These examples will cover a wide range of use cases, from basic traffic capture to advanced filtering and analysis.
Basic Syntax
The basic syntax of tcpdump
is:
options
: Modify the behavior oftcpdump
, such as specifying the interface to capture on or the output format.expression
: Defines what kind of traffic to capture. This is where you specify hostnames, IP addresses, ports, protocols, and other criteria.
Capturing Traffic on an Interface
To capture all traffic on a specific interface, use the -i
flag followed by the interface name. For example, to capture traffic on the eth0
interface:
To see a list of all available interfaces, use the command:
Capturing Traffic to/from a Specific Host
To capture traffic to or from a specific host, use the host
keyword followed by the hostname or IP address:
This will capture all traffic to and from the host with the IP address 192.168.1.100
.
Capturing Traffic on a Specific Port
To capture traffic on a specific port, use the port
keyword followed by the port number:
This will capture all traffic on port 80 (HTTP).
Combining Filters
You can combine filters using and
, or
, and not
operators. For example, to capture all traffic to or from host 192.168.1.100
on port 80, use:
To capture traffic from 192.168.1.100
on either port 80 or 443, use:
Advanced Filtering
Filtering by Protocol
To filter by protocol, use the ip
, tcp
, udp
, or other protocol keywords. For example, to capture only TCP traffic:
To capture only UDP traffic:
Filtering by Source or Destination
To filter by source or destination host or port, use the src
or dst
keywords:
This will capture all traffic from the host 192.168.1.100
.
This will capture all traffic destined for port 443.
Filtering by Network
To capture traffic within a specific network, use the net
keyword:
This will capture all traffic within the 192.168.1.0/24 network.
Saving Captured Traffic to a File
To save captured traffic to a file, use the -w
flag followed by the filename:
This will save all captured traffic on the eth0
interface to the file capture.pcap
.
You can later analyze this file using tcpdump
or another packet analyzer like Wireshark.
Reading Captured Traffic from a File
To read captured traffic from a file, use the -r
flag followed by the filename:
This will read and display the traffic from the file capture.pcap
.
Verbosity
You can control the verbosity of tcpdump
output using the -v
, -vv
, or -vvv
flags.
-v
: Verbose output.-vv
: More verbose output.-vvv
: Most verbose output.
For example:
50 tcpdump Examples
Here are 50 tcpdump
examples to help you isolate traffic in various situations:
- Capture all traffic on interface
eth0
: - Capture all traffic on interface
wlan0
: - Capture traffic to or from host
192.168.1.100
: - Capture traffic to or from host
example.com
: - Capture traffic on port 80 (HTTP):
- Capture traffic on port 443 (HTTPS):
- Capture traffic on port 22 (SSH):
- Capture traffic on port 21 (FTP):
- Capture traffic on port 25 (SMTP):
- Capture traffic on port 53 (DNS):
- Capture traffic from host
192.168.1.100
: - Capture traffic to host
192.168.1.100
: - Capture traffic from port 80:
- Capture traffic to port 443:
- Capture all TCP traffic:
- Capture all UDP traffic:
- Capture all ICMP traffic:
- Capture traffic to or from network
192.168.1.0/24
: - Capture traffic from network
192.168.1.0/24
: - Capture traffic to network
192.168.1.0/24
: - Capture traffic to host
192.168.1.100
on port 80: - Capture traffic from host
192.168.1.100
on port 443: - Capture traffic to or from host
192.168.1.100
on port 80 or 443: - Capture all traffic except ICMP:
- Capture all traffic except port 80:
- Capture traffic with a specific TCP flag (SYN):
- Capture traffic with a specific TCP flag (ACK):
- Capture traffic with a specific TCP flag (RST):
- Capture traffic with a specific TCP flag (FIN):
- Capture traffic with a specific TCP flag (URG):
- Capture traffic with a specific TCP flag (PSH):
- Capture traffic with a specific TCP flag (ALL):
- Capture traffic with a specific TCP flag (NONE):
- Capture traffic with a specific TCP flag (SYN/ACK):
- Capture traffic with a specific TCP flag (SYN/RST):
- Capture traffic with a specific TCP flag (SYN/FIN):
- Capture traffic with a specific TCP flag (PSH/ACK):
- Capture traffic with a specific IP fragment offset:
- Capture traffic with a specific IP TTL:
- Capture traffic with a specific IP DSCP:
- Capture traffic with a specific IP ECN:
- Capture traffic with a specific TCP sequence number:
- Capture traffic with a specific TCP acknowledgement number:
- Capture traffic with a specific TCP source port range:
- Capture traffic with a specific TCP destination port range:
These examples should provide a solid foundation for using tcpdump
to analyze network traffic.
Happy hunting!
-Daniel
Source link